Chapter 3: Exploring Pentesting and AWS
Welcome to the next portion of the journey. Here, we will begin to take the knowledge that we learned from the previous two chapters and start applying it to further our knowledge about pentesting and AWS. It is important that you understand the previous two chapters because we will be building more instances throughout this book and will be using the pentesting methodology you read about in Chapter 2, Pentesting and Ethical Hacking.
For this chapter, we are going to focus on what it means to scan and enumerate information from the host that we built, as well as other general systems. Scanning and enumerating is one of the most important steps in pentesting, so it's crucial that we take a trip down recon ...
Get AWS Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.